Ransomware victim disclosure
← All victimskisnet.co.jp
Claimed by BrainCipher · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- BrainCipher
- Status
- Data leaked
- Country
- JP
- Sector
- Telecommunication
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profilekisnet.co.jp is a Japanese telecommunications and internet services company operating under the .co.jp domain, indicating incorporation in Japan. Based on its sector classification and domain, it likely provides networking, connectivity, or ISP-related services to business or residential customers in Japan. No further detail is available from the public site excerpt.
- Industry
- Telecommunications / Internet Services
Attack summary
Severity: high — Over 1 TB of data has been confirmed exfiltrated and publicly published across multiple onion download links, representing significant business data exposure from a telecom provider; specific data categories (PII, financial, etc.) are unconfirmed, preventing a critical rating.BrainCipher claims to have exfiltrated more than 1 TB of data from kisnet.co.jp and has published the data via multiple Tor-based download links, indicating full data disclosure without a stated ransom demand.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (>1 TB, contents unspecified)
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postKisnet Co., Ltd. is a Japanese internet service provider based in Japan. The company offers broadband and network connectivity services primarily to residential and business customers. Operating within the telecommunications and ISP industry, Kisnet provides internet access solutions in the Japanese market. The company is part of Japan's regional ISP sector, delivering reliable network infrastructure and related services to its subscriber base.
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 12d 8h 29m 41s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
